Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 10:57
Behavioral task
behavioral1
Sample
2b3c4cee8f15da8f434bb75cae644120217743825e0d3b0d5aba93f272b2f6ea.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2b3c4cee8f15da8f434bb75cae644120217743825e0d3b0d5aba93f272b2f6ea.dll
-
Size
899KB
-
MD5
6b29dfcb78cace28810377e227beb030
-
SHA1
4b14c8d9245e36d543a24913fb2fdefb3280c8f8
-
SHA256
2b3c4cee8f15da8f434bb75cae644120217743825e0d3b0d5aba93f272b2f6ea
-
SHA512
077aedfb55e6490c2bf655f02c316a1258e3d43912e3d149c9aa94ca5131c7d4f350a2db35ad2af3fd0a48cc220ab23d44259de458c5909a99f94b0c179522ae
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXq:7wqd87Vq
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1896-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1896 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28 PID 1976 wrote to memory of 1896 1976 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b3c4cee8f15da8f434bb75cae644120217743825e0d3b0d5aba93f272b2f6ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b3c4cee8f15da8f434bb75cae644120217743825e0d3b0d5aba93f272b2f6ea.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1896
-